Question 3
Marks : +2 | -2
Pass Ratio : 100%
What are phishing attacks?
Explanation: Phishing attacks are those attacks in which users are fooled by similar GUI and data is extracted from them. The fake site is then used to obtain the data from the user.
Question 5
Marks : +2 | -2
Pass Ratio : 100%
What are man in the middle attacks?
Explanation: Man in the middle attacks are those attacks in which the users are forced to divert to a fake site where the attack takes place. The fake site is then used to obtain the data from the user.
Question 8
Marks : +2 | -2
Pass Ratio : 100%
The system where two independent pieces of data are used to identify a user is called as ______
Explanation: The system where two independent pieces of data are used to identify a user is called as two-factor authentication. The two factors should not share a common vulnerability.
Question 9
Marks : +2 | -2
Pass Ratio : 100%
Which of the following is a valid encryption technique?
Explanation: Out of the given options, only public key encryption is a valid approach to an encryption technique. In this, there are two different keys to encrypt the data.